Facial recognition systems

Princeton Identity Inc., the identity management company, announced the launch of its new IOM Access600e iris and face biometric capture device, a premium level unit designed for high volume enrollment and fast, convenient identification in high security, high throughput applications. The Access600e replaces the company’s Access500e model, offering superior performance, significantly lower pricing, and a sleek, updated form factor that allows it to fit easily on tight table counters.
The...

UK image processing software specialist Spectral Edge is launching its RGB (visible light) and Near Infrared (NIR) Fusion solution ‘Spectral Edge Fusion’ into the surveillance market at ISC West 2019 to be held in Sands Expo, Las Vegas from 10-12th April.
Spectral Edge Fusion can provide surveillance cameras with high quality, color accurate images even in low or mixed lighting conditions. It is also able to capture much more depth and color in detail that would normally be hidden i...

In preparation for ISC West, the largest converged security and public safety industry trade show, the Security Industry Association (SIA) has identified the top technology advancements to look out for at ISC West 2019. The “Top 8,” presented with ISC Security Events, represent the key technology advancements impacting the converged security and public safety landscape.
The “Top 8” Security Technologies At ISC West 2019:
Cloud
Artificial intelligence
Robotics/autono...

BrainChip Holdings Ltd, global neuromorphic computing company has announced that it recently signed a strategic partnership agreement with Novo Technologies to sell BrainChip’s AI-powered video analytics solutions in Greece and Cyprus.
Novo Technologies currently sells video surveillance, security and access control solutions to police and border control agencies as well as airports, sports stadia and retail/banking locations that require video monitoring. In addition, the company has exp...

The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry.
In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and othe...

News

Rhombus Systems, an enterprise video security startup, releases Unusual Behavior Detection (UBD) to quickly notify organizations when something is wrong. Last year, Rhombus Systems released their AI-Powered R1 security camera to provide organizations cloud-management, facial recognition, people analytics, and enterprise integrations at an affordable price point.
Today’s existing video surveillance systems are reactive and used only after an incident has already occurred. Rhombus is changing this by notifying users in real-time when something is wrong – all without ever having to monitor a video feed.
Modern Video Security
When UBD is activated, it begins collecting data and analyses the setting to determine what’s normal for that particular space
“We’ve been working on this feature for quite some time and are really excited to finally release it,” said Garrett Larsson, Rhombus Systems’ Co-founder and CEO. “We’re providing organizations with modern video security where it’s no longer required for someone to be tied to a desk or to continuously look at feeds. Instead, UBD monitors the environment and will notify you if there’s an event you should look at. This removes the mundane task of monitoring video and provides organizations with more time to focus on other high-priority tasks while also maintaining a high level of security.”
When UBD is activated, it begins collecting data and analyses the setting to determine what’s normal for that particular space. If the cameras capture an abnormal event, the system will send an immediate alert to a user’s preferred notification method.
Fall Detection
Users also have the ability to review video footage containing only unusual behavior, making the task of reviewing large amounts of footage easily accomplishable in only a few minutes. UBD includes another new feature known as Fall Detection. By leveraging the camera’s optics and processor, Rhombus can analyze human postures and movement, such as sitting, walking, running, and etc. With this, the cameras can accurately track movements and issue alerts when a person has fallen down within an organization.
For example - if a person has collapsed, it would normally take 5-10 minutes to notify the appropriate personnel. However, with UBD, as soon as someone falls, the system will recognize this event and notify the right person via phone, email or Slack.
Provide better visibility
Many of our customers have told us that their previous system didn’t shed any light into what was happening during the day"
By combining human posture analysis with unusual behavior, Rhombus can send alerts when a fight, argument, medical emergency, robbery, or any other unusual event has occurred allowing for a wide array of business applications. “We’ve built UBD to provide better visibility throughout large organizations,” said Brandon Salzberg, Rhombus Systems’ VP of Engineering. “Many of our customers have told us that their previous system didn’t shed any light into what was happening during the day.”
“We wanted to provide a solution that concentrated on solving this problem, so we developed a system that can detect over 100 key body points and classify over 10,000 poses, which will help organizations save time by filtering out events that are unimportant, and instead, focus on the events that are.”
UBD Highlights
Here are some of the highlights of Unusual Behavior Detection (UBD):
Human Posture Analysis – The cameras are able to understand human postures, such as walking, sitting, standing, and more.
Unusual Behavior – The cameras can analyze the environment, collect data, and distinguish what’s normal, or abnormal, for a particular space and send real-time notifications when an unusual event has occurred.
Fall Detection – By combining posture analysis and unusual behavior, when a person has fallen, users can receive an immediate notification.
Advanced Video Indexing – Rhombus’s video indexing provides the ability to review large amounts of footage in minutes and filter to see specific events such as motion, human, face, fall, or unusual behavior.
Mobility and Flexibility – Users can provide better security to their organization without being tied to a system or desk. UBD monitors a space and alerts you when an event has occurred.

Suprema, a global leader in biometrics and ID solutions, announces that the company has entered into a commercial software license and distribution agreement with Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, for the licensing of Suprema's BioSign, its under-display fingerprint recognition algorithm.
Suprema has entered the smartphone segment with the Samsung Galaxy J5 in its fingerprint solution for smartphones last year. In February 2018, the company launched BioSign 3.0 at Mobile World Congress (MWC) and has actively pursued the development of integrated solutions with several fingerprint sensor companies.
Fingerprint Recognition Function
In December, Qualcomm Technologies launched the Qualcomm(R) 3D Sonic Sensor, a high performance ultrasonic fingerprint sensor
The previous version, BioSign 2.0, is a fingerprint recognition algorithm technology specialized in ultra-small touch type fingerprint sensor. It provides excellent authentication performance and speed for 4x3.2mm fingerprint sensor, which is essential for applying fingerprint recognition function in mid-range smartphones.
Lately, under-display fingerprint recognition technology, which integrates fingerprint sensors under the display, has been actively developed and introduced with the trend that full-screen display is rapidly applied to smartphones. This year, premium and mid-range smartphones from major brands are expected to be loaded with under-display sensors. There are ultrasonic and optical sensors for under-display type fingerprint sensors. In December, Qualcomm Technologies launched the Qualcomm(R) 3D Sonic Sensor, a high performance ultrasonic fingerprint sensor.
Provide Superior Performance
Qualcomm 3D Sonic Sensor is designed to provide superior performance and security over other fingerprint sensor technologies such as optical and capacitive sensors.
The ultrasonic sensor is also ultra-thin and optically isolated from the display allowing for sleek industrial designs and virtually no impact to display aging
The ultrasonic sensor is also ultra-thin and optically isolated from the display allowing for sleek industrial designs and virtually no impact to display aging (image burn). In the case of the under-display type fingerprint recognition technology, a new recognition algorithm should be optimized for the sensor due to the complicated sensing structure and image characteristics different from the conventional touch type fingerprint sensors. This requires the technical barrier of the algorithm to be very high.
Fingerprint Sensor Algorithms
Suprema's BioSign 3.0 is optimized for the characteristics of the image obtained from the under-display fingerprint sensor, providing a high level of recognition performance and speed. BioSign 3.0 has been developed based on Suprema's 20 years expertise in fingerprint image processing technologies.
"We are proud to be working with Qualcomm Technologies, a leader in under-display fingerprint sensor technology. This well reflects Suprema's strong industry presence as well as how BioSign is one of the preferred solutions among the global smartphone industry. This will be a major step forward in securing leadership in the smartphone segment by expanding cooperation with customers in the future," said Brian Song, CEO at Suprema.
"We will further enhance our mobile development solution capabilities to provide our customers and users with the best possible satisfaction, and we will aggressively develop next-generation core technologies such as large-area fingerprint sensor algorithms and 3D face recognition solutions," Song added.

Ambarella, Inc. a developer of high-resolution video processing and computer vision semiconductors, introduced the CV25 camera System-on-Chip (SoC), the latest in the CVflow family, combining advanced image processing, high-resolution video encoding and CVflow computer vision processing in a single, extremely low power design.
The CV25's CVflow architecture provides the Deep Neural Network (DNN) processing required for the next generation of affordable and intelligent home monitoring, professional surveillance, and aftermarket automotive solutions, including smart dash-cameras, Driver Monitoring Systems (DMS), and electronic mirrors.
Advanced Cyber-Security Features At Low Power
CV25-based cameras are capable of performing AI at the edge, allowing features like facial recognition to happen in real-time on the device""CV25 brings computer vision at the edge into the mainstream," said Fermi Wang, President and CEO of Ambarella. "With this new SoC, we are sharply focused on reducing our customer's overall system cost for delivery of significant computer vision performance, high-quality image processing and advanced cyber-security features at very low power. CV25-based cameras are capable of performing Artificial Intelligence (AI) at the edge, allowing features like facial recognition to happen in real-time on the device, rather than in the cloud."
AI applications enabled at the edge include person recognition and the ability to distinguish between pets, persons, and vehicles. In smart video doorbells, CV25 can automatically recognize familiar faces approaching the front door, flag unknown persons, and alert the homeowner when a package is delivered. In driver monitoring systems, it can detect a driver's drowsiness or level of distraction by monitoring their eyes and facial expressions.
Outstanding Imaging In Low Light Conditions
CV25 delivers efficient video encoding in both AVC and HEVC formats with very low bitrates to minimize cloud storage costs. A high-performance Image Signal Processor (ISP) delivers outstanding imaging in low light conditions, and High Dynamic Range (HDR) processing extracts maximum image detail in high-contrast scenes.
It includes a full suite of advanced cyber-security features to protect against hacking including secure boot, TrustZone(tm), and I/O virtualization. Based on 10nm ultra-low power process technology, the CV25 chip is optimized for wire-free camera applications that require long battery life and small form factors.
Ease In Porting Neural Networks Onto CV25
Ambarella's complete set of CV tools helps customers easily port their own neural networks onto CV25As part of the CVflow family, the CV25 chip shares a common SDK, Computer Vision (CV) tools, ISP, and cyber-security features with the existing CV22 and CV2 SoCs, allowing multiple price-performance options. Ambarella's complete set of CV tools helps customers easily port their own neural networks onto CV25.
The set includes a compiler, debugger, and support for industry-standard machine learning frameworks such as Caffe(tm) and TensorFlow(tm), with extensive guidelines for Convolutional Neural Networks (CNN) performance optimizations.
CV25 SoC Key Features:
CVflow architecture with CNN/deep learning support
4Kp30 AVC and HEVC encoding with multi-stream support
Quad-core 1 GHz Arm(r)Cortex(r)-A53 processor with NEON DSP extensions and FPU
Advanced security features including OTP for secure boot, Trust Zone, and IO virtualization
Real-time hardware-accelerated 360-degree dewarping and Lens Distortion Correction (LDC)
Multi-channel ISP with up to 480 MPixels/s input pixel rate
Multi-exposure HDR and Wide Dynamic Range (WDR) processing, with LED flicker mitigation
SmartAVC(tm) and SmartHEVC(tm) intelligent rate control for lowest bitrates in security applications
Triple-sensor video input with high-speed SLVS/MIPI CSI-2/LVCMOS interfaces
Rich set of interfaces includes Gigabit Ethernet, USB 2.0 host and device, dual SD card controllers with SDXC support, HDMI v2.0, and MIPI DSI/CSI-2 output
Support for DDR4/LPDDR4/LPDDR4x
10nm process technology
13x13mm 0.65-pitch BGA

3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced a number of new products and innovations, led by the company’s new Facial Recognition camera.
3xLOGIC VISIX Facial Recognition Camera
A special purpose, low cost, dual lens 2MP camera for instant face detection, identification, and notification of persons of interest (POI). Using camera-based analytics and 3xLOGIC’s exclusive Facial Recognition (FR) application and mobile app, users can review captured facial images and choose persons of interest to place on a watch list within the camera.Facial Recognition can also be used be used to identify VIPs or for accurate people counting"
Using 3xLOGIC’s exclusive web-based Central Management Application in multi-site mode allows POIs to be added via standard AES encryption to one or multiple cameras at sites to notify locally via server or mobile app.
“Customers have been searching for a low-cost solution for instant face detection and notification of persons of interest for a long time. Our new FR camera, in conjunction with our intuitive, easy to use server, and web-based and mobile applications, brings face detection technology to any SMB user, as well as to large retailers seeking to curtail repeat offenders engaged in shoplifting, disturbances, etc. Facial Recognition can also be used be used to identify VIPs or for accurate people counting,” said Mike Poe, 3xLOGIC Product Manager.
VIGIL V250-16 Network Video Recorder (NVR)
To enhance the company’s recording appliance line, they are adding a new 16 channel fully-integrated, intelligent video appliance. Pre-configured with VIGIL Video Management System (VMS) software, this 1U NVR is a highly cost-effective video management platform that combines all the key functionality of VIGIL VMS; unrivalled ease of setup; and 16 dedicated PoE ports for multiple IP devices.
The V250-16 also includes alarm, serial, and audio inputs. Users can monitor their business with an integration to a wide variety of data sources including Point-of-Sale, ATM, access control, alarms, and audio devices. This data can then be tied to video, made searchable, and generate alarms based on specific, user-chosen criteria.
Our new V250-16 fulfills the many requests to expand the IP camera capabilities of our V250 models"
“Our new V250-16 fulfills the many requests to expand the IP camera capabilities of our popular 4 and 8-camera V250 models. Customers can now enjoy full 16 camera capability and processor improvements to the platform—all at a very attractive price point,” Poe added.
Windows 10 On VIGIL And infinias Servers
Windows 10 will begin shipping on all VIGIL and infinias servers and All-In-One edge recording appliances in January 2019. Windows 10, which features expanded hardware compatibility improvements as well as increased security, is the industry standard in OS and offers true 64-bit compatibility. Along with Windows 10 compatibility, 3xLOGIC is also introducing a new, streamlined and user-friendly recovery environment on all servers.
PoE (Power over Ethernet) Splitter/Extender
This small box created a big buzz at the 2018 ISC West show. It’s a PoE+ splitter/extender capable of taking one PoE+ CAT 5/6 run and splitting it into two, allowing the installer to either add an additional camera to an existing location, add an infinias access-controlled door, or install two cameras in one location. Applications for this device span IP cameras, thermal detection, or access control additions.
For instance, a user can add a thermal imager to an existing IP camera location to provide an additional layer of protection. A PoE+ injector is required at the PoE switch to provide the additional power. The PoE Splitter enables the customer to leverage existing cabling infrastructure to increase their surveillance footprint while saving time and costly cable installation charges.
128GB SD Card Support For Multi-Sensor Device
Customers can double the storage capacity of the current 64GB offering and enjoy the ability to host VIGIL ServerOur customers asked and we listened. The 3xLOGIC Indoor Multi-Sensor now has a 128GB SD card option. Customers can double the storage capacity of the current 64GB offering and enjoy the ability to host VIGIL Server, allowing the camera to record video to the onboard SD card, with full search capabilities in VIGIL Client, and in the View Lite II and infinias mobile apps.
A true all-in-one solution, built-in Passive Infrared (PIR) sensors, 2-way audio with VIGIL Server, and digital I/O allow the Multi-Sensor to be an alarm annunciator, audio system, and video recorder, all in one, small unit.
Protection For People And Property
“These new products highlight our commitment to providing customers with leading edge, proactive security solutions that are key to the next level of protection for people and property, as well as providing data that presents an unparalleled view into the operational aspects of their business. This facial recognition technology extends our strategy of supplying highly-useful, real-time data that started with our thermal sensors and Multi-Sensor edge devices.
“3xLOGIC’s global expansion is well underway and these innovations provide our partners with new opportunities, and their customers with the confidence they are operating in a leading-edge, secure, intelligent environment,” commented Bill Hobbs, VP of Sales for 3xLOGIC.

Sensory, a provider of speech and vision technologies that enhance the user experience and security of consumer electronics, announces the release of its fourth generation of TrulySecure FIDO Certified multimodal biometric authentication technology. Now smarter, faster and more secure than ever before, the TrulySecure 4.0 SDK boasts a variety of new AI features that cater to today’s smartphones, mobile apps, and IoT devices, including support for 3D cameras, GPU utilization for authentication processing, new liveness challenges and options for integrating components of TrulySecure into cloud-based authentication systems.
With each subsequent revision, Sensory continues to significantly enhance the performance, security and features offered by TrulySecure. Version 4.0 continues the trend by expanding on Sensory’s market-proven face authentication AI performance and accuracy.
Facial Recognition Solutions
A common problem with traditional 2D facial recognition solutions is the inability to authenticate users in challenging lighting or no-light scenarios
With version 4.0, TrulySecure’s deep learning AI has been trained on a data set that is an order of magnitude larger than the previous generation, which has improved 2D facial recognition accuracy more than 50-percent.
A common problem with traditional 2D facial recognition solutions is the inability to authenticate users in challenging lighting or no-light scenarios. The use of an IR illuminator completely eliminates this problem, essentially allowing TrulySecure to see clearly and authenticate users in all lighting conditions, including complete darkness. 3D camera support also increases the robustness of TrulySecure to varying pose angles, making the system more accurate during casual use across a broader range of conditions, and more resistant to spoof attacks.
Biometric Authentication Data Processing
TrulySecure's support of 3D camera data has been developed in collaboration with pmd Technologies from Germany, the worldwide 3D Time-of-Flight CMOS-based digital imaging technology supplier. 3D cameras from pmd are already integrated into smartphones, robots, cars and AR headsets.
Another major update in TrulySecure is the ability to split the biometric authentication data processing load between a device’s GPU and applications processor. To accomplish this, key processor-heavy components of the core TrulySecure algorithm were isolated, streamlined and specially ported to run on a GPU. In testing, it was found that those isolated components of TrulySecure run as fast or even faster on the GPU than on the AP. Moving heavy processing components of TrulySecure from the AP to the GPU allows the applications processor to either prioritise other tasks, or work in parallel with the GPU to cut the amount of processing time required for the TrulySecure algorithm in half.
Liveness Detection Capabilities
The first major leap forward from the previous version of TrulySecure is the use of 3D image data for authentication
As an added bonus, isolating and streamlining processor-heavy components of the TrulySecure algorithm has opened up a whole new realm of possibilities for porting to other embedded environments in the future.
An area of concern for all authentication modalities is spoofing. While previous generations of TrulySecure face and voice recognition featured anti-spoofing and liveness detection capabilities, TrulySecure 4.0 makes spoofing a concern of the past. The first major leap forward from the previous version of TrulySecure is the use of 3D image data for authentication. This allows TrulySecure to not only recognize the user’s face, but the shape and contour of it too – and immediately reject 2D images and videos of the user’s face. Requiring 3D facial imagery serves as an excellent anti-spoofing measure, but not all devices have 3D cameras. For traditional 2D RGB camera applications, Sensory’s TrulySecure now features a face liveness challenge that makes it virtually impossible for anybody but the enrolled user to get in.
Cloud-Based Authentication
TrulySecure’s face liveness challenge requires the enrolled user to follow prompts telling them what kind of movement to make in order to be authenticated. Additionally, TrulySecure now features an ‘eyes open’ challenge, that requires the user’s eyes to be open during authentication. Sensory’s technologies have long been the go-to for those looking to integrate powerful AI at the edge, but now TrulySecure can make cloud-based authentication technologies faster, more convenient and more secure.
One way that TrulySecure can do this is via its incredibly quick on-device enrollment component for federated authentication. With federated authentication, once a user completes the TrulySecure enrollment process on their device, TrulySecure creates a user enrollment template that can be handed off to the authentication server. Once the template is received by the server, it can be sent to other devices as needed, allowing the enrolled user to authenticate by face on any permitted device or app.
Authentication Images
This mitigates security risks associated with sending photos of a user’s face used for authentication over the internet
TrulySecure can also be used to reduce authentication data loads sent to cloud-based authentication systems by moving pre-authentication steps like liveness detection and feature extraction to the edge. TrulySecure’s on-device liveness detection can be used to immediately verify user authentication samples for liveness before sending captured authentication images to the server for processing.
Taking it another step further, by enabling TrulySecure’s on-device feature extraction, once the AI detects liveness, it can then immediately convert the user’s facial features into templates (irreversible mathematical data) that can be sent to the authentication server instead of sending multiple images. This mitigates security risks associated with sending photos of a user’s face used for authentication over the internet, and significantly reduces the amount of data sent to the cloud for authentication.
Ideal for a wide range of applications, including smartphones, tablets, PCs, personal assistant technologies and robots, Sensory’s SDK for TrulySecure 4.0 face authentication is now available and currently supports ToF 3D cameras from pmd Technologies.

FLIR Systems, Inc. announced the FLIR Firefly camera family, the industry’s first deep learning inference-enabled machine vision camera. The FLIR Firefly, which integrates the Intel Movidius Myriad 2 Vision Processing Unit (VPU), is designed for image analysis professionals using deep learning for more accurate decisions, and faster, easier system development.
Traditional rules-based software is ideal for straightforward tasks such as barcode reading or checking a manufactured part against specifications. The FLIR Firefly combines a new, affordable machine vision platform with the power of deep learning to address complex and subjective problems such as recognizing faces or classifying the quality of a solar panel.
Improves Speed And Power Efficiency
The FLIR Firefly leverages the Intel Movidius Myriad 2 VPU’s advanced capabilities in a compact and low-power cameraThe FLIR Firefly leverages the Intel Movidius Myriad 2 VPU’s advanced capabilities in a compact and low-power camera, ideal for embedded and handheld systems. Machine makers can load their trained neural networks directly onto the Firefly’s integrated VPU. Additionally, Intel Movidius Neural Compute Stick users can easily deploy their existing networks directly onto the Firefly. This unique design reduces system size and improves speed, reliability, power efficiency, and security.
"Automated analysis of images captured by machines is a key part of our day-to-day lives that few of us think about,” said James Cannon, President and CEO of FLIR. “The quality, affordability, and speed-to-market of items like our smartphones or the food on our tables are made possible by systems using cameras doing both inspection and automated production. With the FLIR Firefly powered by Intel Movidius Myriad 2 VPU, we are enabling the designers of these systems to leverage deep learning faster and at lower costs.”
Intel Movidius Myriad 2 VPU
“The Intel Movidius Neural Compute Stick enabled FLIR to rapidly prototype, streamlining the early development of machine learning in the Firefly,” said Adam Burns, Director of Computer Vision Products at Intel. “Now the FLIR Firefly uses the compact, efficient Intel Movidius Myriad 2 VPU to perform real-time inference in the camera, without compromising the amazing levels of miniaturization that FLIR has achieved in this device.”
FLIR will demonstrate a preview of the Firefly camera at the VISION conference in Stuttgart, Germany, in the FLIR booth (Hall 1, Stand 1B42).

Expert commentary

When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects.
This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of them have a formal process in place. Large security projects require clear KPIs and targets (including monthly commitments), ongoing review, regular clear communication and a dedicated team for consistency and continuity from start to finish.
Major Security System
Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs
If you don’t choose wisely, what you may end up with is company delivering a string of different people from different departments working on your installation at any given time, without a joined up approach. The person responsible for system design, for example, may never see your project when it’s actually being installed, which can lead to a potentially problematic and ultimately unsatisfactory outcome.
While every major security system design project will bring about its own set of challenges, the approach taken by the security vendor should remain consistent. Here’s what it should look like at the different stages of the project and what you should expect from your supplier. Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs.
Product Knowledge
Going down this route limits your options and you could end up with a security system that meets the vendor’s product portfolio rather than your needs. That doesn’t mean to say that a security company that is not affiliated to specific manufacturers won’t have close relationships with a range of them. A close relationship can be beneficial in terms of in-depth product knowledge and preferential pricing.
What’s most important is that the security company independently test and asses product rather than relying on manufacturers’ claims. They should continually appraise the marketplace to see what’s new and assess the value and relevance of product. They should also have the finger on the pulse of the security sector to identify where the market is going.
Team work is essential with large projects not only to get the job done, but also to manage any risk
Comprehensive Strategy
At STANLEY Security we very much focus on identifying technology solutions that minimize financial outlay for a client, such as video analytics. At present we are testing facial recognition systems which have grown in popularity and delivery.
A written, comprehensive strategy needs to be in place for the project, including forecasting that considers the longer timescales involved in large, complex projects and includes a ‘what if’ approach to ensure appropriate resource is available. So, for example, if a project looks like it is going to overrun due to unforeseen circumstances, you want to be sure you retain the same team on the project full time and that they are not transferred onto the next contract or dividing their time between the two.
Manage Any Risk
Team work is essential with large projects not only to get the job done, but also to manage any risk. Your vendor must have an experienced Major Project Team with a clear structure, so everyone knows their role and you know who you are dealing with at any given time.
Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate
If subcontractors are being used by the security company, which is quite usual for very large installations and for particular specialisms (e.g. control room modelling), then a process needs to be in place to manage them and you need to be made aware of this. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate.
High Security Requirements
This is where the dedicated Major Project Team is vital as they will know the project inside out and have worked on it from start to finish, helping to avoid any end of project issues.
Large, complex security systems, especially those with high security requirements, are not easy to deliver. They require skillful, experienced hands, substantial resources in both financial and staffing terms, and a clear, consistent procedure that everyone is fully aware of. Don’t assume that just because you are dealing with a large security vendor they will have all of these in place; think like a security professional and ask to see the evidence!

According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location.
While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies.
Gunshot Detection Solutions
AI weapon detection offers a more efficient alternative to prevent active shooting
There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered.
With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyze the video feeds, and instantly notify security staff when a gun is spotted.
Comparison of the advantages for law enforcement and public security agencies
Legacy gunshot detection using sensors
AI weapon detection
Reactive measure: detect after guns have been fired
Proactive measure: detect before guns are fired
Time to action: within 1 second
Time to action: within 1 second
Unable to provide visual data about shooter(s)
Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle
Unable to track the location of the shooter(s) before and after shooting because of the lack of sound
Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition
False detection caused by similar sound such as fireworks and cars backfiring
Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.)
Require physical deployment of gunshot detection sensors
Can be used with existing camera systems, do not require special hardware
Complicated to deploy, require highly trained professional
Easy to deploy as an add-on to existing video surveillance system
-
Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system
Gun-Shot Detection Advantages
In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public:
Save lives by spotting the shooter before the shooting event.
Minimize the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organized manner and apprehend the intending shooter.
Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide).
For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life?
Written by Paul Sun and Mai Truong, IronYun

In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters.
The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity.
Significant Public Safety
Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety
While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018.
Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism.
Massive Risk Reduction
Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers.
Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks
Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream.
Promising Detection Systems
The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations.
2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants
2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact.
Cyber Risk Profile
The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions.
The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%.
Intelligent Applications
The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access).
5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity
Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018.
Perimeter Intrusion Detection
One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry.
Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR
The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR.
Security Ecosystem Members
Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts.
At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized.
With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.

Security beat

Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc.
Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2.
Adapting Existing Hardware
Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market.
AI software can even add learning capabilities by adapting existing hardware to AI applications
AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field.
Data capture form to appear here!
Detect Anomalous Data
Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions).
IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event.
The ability of deep learning for video analytics is much more sophisticated and accurate
Make Critical Decisions
Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets.
AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions.
Multiple Camera Streams
AI can reduce information overload to enable humans to work with the data more efficiently
The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color.
Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there.
Intrusion Detection Scenario
AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images.
In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm.
Part three coming soon. If you missed part one, see it here.

Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security.
Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence.
Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge.
On-Device Artificial Intelligence
On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation
SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation.
A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations.
Intelligent Automotive Solutions
Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions.
CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors.
Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES
Virtual Security Guards
Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers.
My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans.
AI-Integrated Devices
Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously
MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats.
The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously.
Advanced Capacitive Touchscreen
Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox.
Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology.
The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments
Cyber Security Standards
Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity.
FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.

More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive.
Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door.
A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals
Providing A Lightweight Alternative
“When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel.
“Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent.
“Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software
Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options.
There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company.
Modern Network Infrastructure
NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.”
FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location
NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT.
We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair.
There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs?
Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters.
The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs.
A New Focus Away From AI
Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available.
For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear.
To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications.
The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location.
Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel.
On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved
That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.

Case studies

Digital Barriers, edge-based IoT surveillance and security technologies solutions provider, has announced that its cutting-edge facial recognition technology was successfully deployed at The O2 in London to enhance security at both The BRIT Awards (“BRITs”) in February and the National Television Awards (“NTAs”) in January this year. The technology was used to screen guests at multiple entrances at both events, which had a combined television audience of more than 10 million viewers.
“After a series of demonstrations with facial recognition providers, we selected Digital Barriers for our live trials. Their holistic approach, analytic technology and partnership with human verification worked perfectly in a real-world deployment,” said Stefan Thompson.
Digital Barriers – SRI Partnership
At the O2, Digital Barriers partnered with Super-Recognizers International (SRI), whose trained staff identify faces in crowds, enabling them to respond quickly to any matches on the system. Digital Barriers provides mobile apps linked to its facial recognition system, enabling face-to-face secondary verification and the super recognizers were fully trained in this technology.
Digital Barriers has the best facial recognition technology of any I’ve seen, and I’m excited to join"
Digital Barriers has also announced that following this successful partnership, Kenny Long, SRI’s co-founder and COO, has joined Digital Barriers. “As an expert in people identification I’ve seen every solution on the market,” he said. “Digital Barriers has the best facial recognition technology of any I’ve seen, and I’m excited to join.”
Facial Recognition System At O2 Arena
Digital Barriers and SRI have agreed to partner together wherever there is a requirement to combine facial recognition and specialist operators. “This is a unique offering anywhere in the world,” Kenny Long explained, “and I look forward to working with my former colleagues.”
“The O2 is the world’s most popular music and entertainment venue, we’re continually reviewing our security measures. The use of facial recognition is proving to be a valuable enhancement to the security and safety of the venue, its guests and staff. The trials with Digital Barriers have been successful and we’re committed to creating a safe and secure venue for all our fans, staff and performers,” said Paul Williams, Senior Security Manager at The O2.
“There are multiple companies in the facial recognition field making claims as to what their technologies can do in the real-world – most have never deployed at scale successfully and rely instead on exaggerated marketing,” said Zak Doffman, CEO of Digital Barriers. “We work with government agencies around the world. Our technology is field-proven in the hardest operating environments. We are delighted with the successful deployments at The O2 and that Kenny Long is joining us. Both attest to the world-class quality of our technology.”

A 300-plus camera city center video surveillance scheme in Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology.
The previous analog-based CCTV system was more than 20 years old and had become expensive to maintain, so City of Lincoln Council decided to replace the analog cameras and transmission equipment with HD digital equipment. The total cost of ownership has been reduced by the savings made on legacy fiber lease costs, as well as reduced energy consumption and the ability to configure and maintain the cameras remotely.
Installation Of IP Full HD System
The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design.
The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network.
Bandwidth Efficiency Using H.265 Compression
A combination of fixed and PTZ cameras were installed over a new 1GB duplex network. These include cameras from the Dahua Pro series, which features high image quality, bandwidth efficiency using H.265 compression and excellent low-light performance. Bullet cameras from the Ultra series – with powerful optical zoom, IR distances of up to 50 metres and software which supports people-counting and heat-mapping – were also installed.
The design of the scheme incorporated both camera and server-side analytics with legacy motion and audio detection
The bandwidth efficiency of the cameras meant that multiple cameras could be installed in any given position, providing 360° coverage of locations and up to 20 Megapixels of video capacity per location – compared with less than 400,000 pixels with the previous analog cameras.
The design of the scheme incorporated both camera and server-side analytics, including video content analytics, facial recognition, ANPR, heat maps and pedestrian counting, as well as legacy motion and audio detection. The objective of the facial recognition aspect is to support operators in areas such as the search for missing and vulnerable individuals.
PoE Switches For Providing Power
The superior image quality of the new system is borne out in figures which show an increase in ‘actionable’ images from 5% with the previous system to 60% successful reviews with the new one. Dahua PoE switches were also installed to provide power to the cameras, which are then connected to a layer-2 network.
A new video wall comprising ten Dahua DHL49-4K LED backlit 49-inch 4K Ultra HD video wall display units featuring industrial level wide-viewing LCD panels, was fitted into a newly refurbished control room in City Hall and connected to i-Comply wonderwall video display drivers.
This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security"Supplied through authorized distributor Mayflex, the entire system was installed by public space CCTV specialists Videcom Security, which worked with other partners to provide a high-performance, efficient and feature-rich system.
Cost-Effective And Reliable Equipment
Bill Mead, Managing Director at Videcom Security, said that working largely with Dahua video equipment meant it was easier for engineers in terms of configuration, as well as being cost-effective and representing good value for money. “Working with the Dahua product range has been great. The products have proved to be reliable and we experienced very few problems, from the initial configuration through to installation and commissioning.
“This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security. We broke new ground with the development of 4K H.265 decoding, the support through Luxriot for camera-side analytics and edge recording, and the development by Dahua of camera-to-camera communication, allowing for non-connected systems to communicate locally.”
Infinet 5GHz And Siklu E And V Band Radios
Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex AcademyDahua is a solution provider in the global video surveillance industry and associated technology and has a keen focus on innovation by investing heavily in research and development. For the Lincoln city scheme, its products were selected based on their performance and cost-effectiveness to meet project budgets. Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex Academy. This helped Videcom negotiate key firmware enhancements, which added to many of the analytical features available in each of the cameras.
The wireless network is built with Infinet 5GHz and Siklu E and V band radios. Resilience and diverse routing has been built into the network design, which supports video surveillance as well as public Wi-Fi and capacity for smart city services. Luxriot have worked closely with Dahua, supplying their Evo Global video management system and supporting edge analytics integration through their ‘events and actions’ management, which has also been integrated through to i-Comply’s VTAS CRVMS software (now rebranded as Viewscape).
Real-Time Control And Video Streaming
The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution"The introduction of H.265 compression was ground-breaking for such a project, with the system capable of displaying 4MP and 6MP H.265 to the operator’s spot monitor with real-time control and video streaming. “The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution,” said Martin Byrne, CCTV Team leader at Lincoln City Council. “The police are extremely pleased with the system and we’ve had very positive feedback from them.
“There is really no comparison from how we operated previously to how we can now. It revolutionizes how we manage the CCTV systems and data. The potential for what we can achieve going forward is remarkable. We have now started to get real results from the investment in analytics; in particular vehicle and people-counting has been deployed and data is used to enhance other city projects.”
Martin added: “Dahua has taken time out to visit and discuss with us our ambitions for smart city services. We have adopted Dahua as our brand of choice for CCTV cameras and have so far been very pleased and impressed with their reliability, low-light performance and overall image quality.”

Jumbo Ten Brink Food introduced the face server into their store environment in March 2017 after discovering that almost 80% of shoplifting took place via large shopping bags. Since then, Jumbo has installed 80 Panasonic cameras in-store, helping them to win the award.
Previously recognized by the National Institute of Standards Technology (NIST) as the most accurate on the market, Panasonic’s face server uses deep learning technology which maximizes the performance of the core engine to achieve accurate and reliable recognition.
The technology identifies faces that are ordinarily difficult to recognize with conventional techniques, such as those taken from an angle of up to 45 degrees to the left or right or 30 degrees up or down. It also maintains a 90% accuracy rate when detecting faces that are partially hidden by sunglasses or face masks.
With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old
Enhanced Security Protection
If people are caught stealing, their image remains on the database. The face server provides a real-time processing capacity of up to 20 cameras per server and can execute high-speed searches of up to 30,000 registered reference faces. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old.
“The moment that a known shoplifter attempts to re-enter the store, an internal alarm is triggered, and we can take the best suitable action,” explains Edwin ten Brink, founder of Jumbo Ten Brink Food stores. “Thanks to the Panasonic face matching server, Jumbo has been proclaimed the safest store in the Netherlands."
Karen Sangha, Panasonic’s Security Solutions Regional Marketing Manager says, “We are pleased to see that our customers are winning awards as a result of implementing our technology. We firmly believe that our face server is industry-leading and Jumbo Ten Brink Food’s success is testament to that.”

CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that its award-winning PSIM technology was used to support a multiagency security program for Super Bowl LIII.
The company’s IPSecurityCenter PSIM solution is installed in the Atlanta Police Department’s Video Integration Center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl.
Provide Law Enforcement
Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The City has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them.
IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement
IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene.
Crowd Size Monitoring
“Estimates are that nearly one million people traveled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software.
“IPSecurityCenter was installed in the VIC by the Atlanta Police Department to provide the real-time situational awareness and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities.
The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defense system and sensor technologies, including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.

3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced that the Flint (MI) Boys and Girls Club now enjoys significantly improved safety and security with its newly-installed 16-camera video surveillance system.
Safety Concerns
Tauzzari Robinson, Chief Executive Officer of Flint Boys and Girls Club, spent his early career working at clubs in Chicago, “Oftentimes, these were rough neighborhoods, so the importance of safety is strongly ingrained in me. The previous video surveillance system at the Club was adequate, but it was getting old and staff wondered if they were missing out on newer, better technology.
The new video surveillance system monitors key areas inside the club and outside, with views of the approach to the entrance, as well as the parking lot
“We had grown our old system up to 16 cameras, and we had expanded the number of areas under surveillance,” explained Robinson. “However, the image quality was not great, and we didn’t have much zoom capability.”
Installation Of 16 4MP IP Cameras
Robinson asked a staff member, who was in charge of monitoring the cameras on a day-to-day basis, to speak to the Boys and Girls Club Board of Directors. “This staff member told the Board plainly that we needed better technology.” Fortunately, Board Member Mike Buckel, VP Sales and Marketing for Sonitrol Great Lakes, knew exactly what was needed.
Between Sonitrol Great Lakes and 3xLOGIC, the two companies worked with the Club to design and install a brand-new, fully-IP system of 16 4MP cameras, backed by a 3xLOGIC V5000 server. 3xLOGIC discounted the hardware and Sonitrol Great Lakes donated all the installation and on-going support and labor.
“We could tell a huge difference immediately between our old cameras and the new 3xLOGIC IP cameras,” recounted Robinson, “and the ease of use was very clear as well.” The new video surveillance system monitors key areas inside the club and outside, with views of the approach to the entrance, as well as the parking lot, where buses and cars pick-up and drop-off.
Ensuring Children’s Safety And Security
Our kids know those cameras are there and it’s not only a deterrent, but parents and staff know we have our children’s safety and security as a top priority"The Flint Club has a large population—160-180 children daily during the school year and in the summer, upwards to 250 a day. As children move about the building, staff can monitor them, key in on any shenanigans, or worse, zoom into a situation with excellent clarity and solve any problems.
“We are the safe place for the children in our community; we have to provide the safest environment possible,” said Robinson. “With this new system, we are accomplishing that. Our kids know those cameras are there and it’s not only a deterrent, but parents and staff know we have our children’s safety and security as a top priority.”
24/7 Mobile Access To Camera Views
Robinson is also impressed with his 24/7 mobile access to camera views. “If I’m at home at 8:30 at night, I can access video on my iPad and make sure we’re closed properly. That provides real peace of mind. The system provides something else too: It used to be if I responded to calls at the Club after hours, my wife wasn’t too thrilled, she’s a lot happier with this new system!”
The Club’s front desk staff monitor camera views during regular business operations, 9:00-5:00 and from 3:00-8:00 when children are present. Front desk staff and Robinson’s administrative assistant monitor all views and the front door, which is on a buzzer system to grant entry. Staff do a combination of live monitoring and after-incident review.
VISIX Facial Recognition Cameras
Some of the new cameras are trained on the Club van in the parking lot with feeds to the Flint Police CattEye surveillance programRobinson concluded, “Our new system is 100% better. Before, it could take us up to an hour to review an incident, now it’s immediate. We must be able to solve issues quickly, and get back to work, back to our priorities for the children. And I’ll tell you what, these kids know about the system, they see it in action, and they’re on their best behavior.”
In addition to video being monitored onsite, some of the new cameras are trained on the Club van in the parking lot with feeds to the Flint Police CattEye surveillance program. Now that the new system is up and running and functioning well, 3xLOGIC and Sonitrol staff have introduced the idea of installing one of 3xLOGIC’s new VISIX Facial Recognition cameras.
Such FR technology would enable the Club to create a watch list of faces, so they are notified if a person of interest approaches or enters the building. This way, unauthorized people are not picking up children from the Club.

Police in the Belgian city of Lokeren can now respond more effectively to criminal incidents – thanks to an upgraded video surveillance solution that features 120 Sony security cameras, including the rugged SNC-VM772R 4K minidome camera.
Lokeren Video Security System
Like all urban centers, Lokeren faces the challenges of crime, vandalism and antisocial behavior in its streets, public buildings and open areas. Until recently, the municipal police force relied on analog security cameras to assist with detecting and responding promptly to incidents. However, these cameras’ limited resolution and image quality often prevented efforts to prosecute individuals as they could not be successfully identified.
In response to requests from citizens to maximize their safety, Lokeren police chiefs and city politicians pledged to upgrade their video surveillance capabilities. In particular, the urgent need was identified to improve the accurate recognition of suspects caught on camera – an even greater challenge at night or on dull, poorly-lit days.
Full HD And 4K Network Surveillance Cameras
Security specialists DS-Consulting therefore recommended upgrading Lokeren’s video security to a combination of Full HD and 4K network surveillance cameras. A competitive comparison by DS-Consulting saw Sony’s outdoor minidome and fixed box-type cameras compare favorably with other brands.
The rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions
“There was only one choice when we compared the image quality of Sony’s security cameras against other market-leading brands” states Emiel De Smet of security specialist DS-Consulting. “They offer so much more detail and clarity – and that makes all the difference in critical surveillance applications.”
SNC-VM772R 4K Minidome Camera
In particular, the rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions. The camera’s large-sized Exmor R CMOS image sensor allows it to capture more light than ordinary sensors. This allows it to ‘see’ suspicious activity clearly in conditions of almost complete darkness, where less sensitive cameras struggle.
Installed by Belgian integrator Seris Technology, the complete surveillance solution features a video management platform by Genetec Security Center plus 120 strategically located Sony cameras, providing 24/7 coverage of city center streets as well as public buildings, including Lokeren’s police station, central library and city hall.
Crime Prevention And 24/7 Video Monitoring
The new cameras give police a clearer picture of criminal activity in the city streets, assisting with the positive identification of suspicious persons even at night and in low light conditions. Round-the-clock video footage is routed via an optical fiber network, where images are monitored in the central dispatch office at police headquarters.
Since the cameras’ installation, city police have seen a reduction in crime levels, accompanied by greater peace of mind for residents and visitors.

Round table discussion

The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?

Artificial intelligence (AI) is a current buzzword in the physical security market – and the subject of considerable hype. However, AI sometimes get negative press, too, including dire warnings of its potential and eventual impact from some of our most prominent technology thinkers. We decided to take the issue to our Expert Panel Roundtable with this week’s question: What are the negative impacts and/or new challenges of AI for physical security?

By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?